New algorithm mining intrusion patterns

  • Authors:
  • Wu Liu;Jian-Ping Wu;Hai-Xin Duan;Xing Li

  • Affiliations:
  • Network Research Center of Tsinghua University, Beijing, P.R. China;Network Research Center of Tsinghua University, Beijing, P.R. China;Network Research Center of Tsinghua University, Beijing, P.R. China;Network Research Center of Tsinghua University, Beijing, P.R. China

  • Venue:
  • FSKD'05 Proceedings of the Second international conference on Fuzzy Systems and Knowledge Discovery - Volume Part II
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we apply data mining techniques to construct intrusion detection patterns. We mine both system audit data and network traffic data for consistent and useful patterns of program and user behavior, and use an iterative low-frequency-finder mining algorithm to find the low frequency but important patterns.